Privileged Password and Privileged Session Management

According to the 2016 Verizon Data Breach Investigations report, 63% of confirmed data breaches involved weak, default or stolen passwords. In addition to insiders using valid credentials, many of these attacks include hackers that are gaining internal access by compromising desktops, gaining a foothold, and then leveraging captured or stolen credentials to move laterally within the corporate perimeter. In response, organizations must continue make lateral movement of these attackers more difficult. Best practice recommendations include: implementing multi-factor authentication, complex password policies, enforcing unique passwords across systems, and frequently changing passwords. However, one privilege vulnerability that can be challenging to address and that is often overlooked is hard-coded passwords found within code, scripts and supporting files.